In today’s data-driven world, receivers and sensors along with historical data have been used to hunt down willful and intentional GPS jamming by people wishing to evade tolls, trucking companies, employees wanting to evade employer surveillance as well as sophisticated jamming patterns and spoofing that would require a highly-sophisticated adversary and gear that is not available to the average citizen.
This webinar gives a brief introduction into the vulnerabilities of satellite navigation and timing systems and the ways in which these vulnerabilities can be exploited. The specific vulnerabilities of GPS-based systems are introduced – the main vulnerabilities of GPS are due to the very low signal strength of the satellite signals. The webinar also discusses the effect of Radio Frequency (RF) interference on satellite navigation and timing systems and uses some real examples of disruption caused by real-interference events. The webinar also highlights that spoofing can be carried out either at the application layer (using PokemonGO as an example to demonstrate this) or at the RF level – where different examples are used to demonstrate this.
This webinar will discuss the wide variety of exploitations of RF interference used by several groups of attackers with various motives – often these groups attempting to exploit navigation and timing system vulnerabilities are the same types who have exploited IT systems. Approaches to mitigate systems and devices against the described vulnerabilities are showcased along with a protective risk assessment and test framework that can make significant improvements to existing systems.
Date: Wednesday, September 13, 2017
Time: 8:00 AM PDT | 11:00 AM EDT | 3:00 PM GMT
Duration: 45 minutes followed by live 15-minute Q&A
If you have any questions about content discussed in the webinar or about how Spirent Security Solutions can help your security arsenal, do not hesitate to contact us or visit our Security Solutions page for more information.
Domain expertise: Automotive, Web application testing, Network penetration testing, Wireless, Embedded, Social Engineering, IOT, SCADA, Reverse Engineering, Red Team, Lock Picking
Vlad is a driven security researcher with a passion for securing technology that makes civilized life possible. He is particularly focused on automotive security, satellite systems security, SCADA systems supporting the critical infrastructure and wireless networks. He specializes in the intersection of physical and network security. He has worked on DARPA projects, established and lead penetration testing teams for Fortune 50 organizations, performed incident response and forensics on sensitive production systems within controlled environments, reverse engineered security devices, and participated in countless red team engagements for banks, critical infrastructure, pharmaceutical companies, law firms and research organizations. Vlad has spoken at various security conferences including Bsides, DEFCON, HOPE, and ShmooCon. Vlad was a board member for NYC OWASP and remains committed to the security community working together to improve the security posture through developer education, end user training, peer- reviewed code and rigorous standardized testing methodologies.